Published: 2021-07-04

Security Analysis and Improvement of Lighweight VANET Authentication Protocol (Case Study : Zhao et al. LVAP)

Politeknik Siber dan Sandi Negara
VANET authentication formal methods Scyther confidentiality man-in-the-middle

Abstract

VANET is an ad-hoc network implemented on vehicle communication to ensure traffic safety and traffic management efficiency. VANET security is a concern because of various vulnerabilities, especially from authentication criteria that the attacker can exploit. VANET is vulnerable to Sybil attack, entity impersonation, message modification, and identity falsification. Several mechanisms and protocols have been developed to address these vulnerabilities. The design of the VANET authentication protocol also needs to be proven using formal methods to ensure that the protocol meets the required security criteria.  In this research, the security of VANET authentication protocol developed by Zhao et al. was analyzed using the Datta et al. security protocol analysis method. Instead of BAN Logic, the Scyther tool was used to verify security claims and find possible attacks. Our Security analysis results show that Zhao et al.'s protocol does not meet confidentiality and entity authentication criteria. Scyther tool can find attacks on nonce confidentiality and man-in-the-middle attack. Therefore, we modify Zhao et al. protocol by adding signature and session key confirmation to improve its security. Based on analysis results, our modified Zhao et al. authentication protocol met confidentiality and entity authentication criteria. The use of signature and session key confirmation prevents man-in-the-middle attack and protects nonce confidentiality. Therefore, our research concludes that modified Zhao et al. authentication protocol more secure than the original protocol in terms of nonce and session key confidentiality, aliveness, weak agreement, non-injective agreement, and non-injective synchronization.

Security Analysis and Improvement of Lighweight VANETAuthentication Protocol (Case Study : Zhao et al. LVAP)

Sepha Siswantyo1)

1) Politeknik Siber dan Sandi Negara, Indonesia

1) sepha.siswantyo@poltekssn.ac.id

INTRODUCTION

Vehicular ad hoc network (VANET) combines wireless communication with data sharing capabilities on vehicles to connect to the network and provide or use network services such as use in offices and residences (Rasheed et al., 2017). The primary purpose of implementing VANET is to provide information related to traffic safety and improve traffic management efficiency (Abdellah et al., 2019). VANET has several characteristics, including high mobility, dynamic network topology, depending on computing and storage capabilities, time criticality, and limited transmission power (Sheikh & Liang, 2019). Security is one of the crucial aspects of VANET implementation. VANET is vulnerable to attack because of its unique characteristics. Therefore, VANET must meet several security criteria, including confidentiality, data integrity, availability, authentication, non-denial, privacy and anonymity, access control, data verification, traceability, and the ability to revoke identity (Hasrouny et al., 2017). Authentication in VANET plays a very vital role, especially authentication of entities and messages. Some of the attacks that exploit weaknesses in VANET include Sybil attacks, impersonation of actual entities (acting like entities), replay attacks, key and certificate replication, message modification, and masquerade attacks (identity forgeries) (Sheikh & Liang, 2019).

Several cryptographic protocols have been developed for authentication on VANET. Some protocol designed with formal analysis to prove its security. Liu et al. lightweight VANET authentication protocol (LVAP) and Zhao et al. LVAP used BAN Logic as manual formal analysis tool (Liu et al., 2017; Zhao et al., 2018). while NERA and LPPA used the game theory tool (Bayat et al., 2020; Zhou et al., 2020). Combination of manual and automated method also can be used to analyze designed protocol. NECPPA protocol analyzed with game theory and Proferif (Pournaghi et al., 2018). BAN Logic and AVISPA used to analyze SAPSC protocol (Kanchan et al., 2019). AVISPA also used to analyze RSEAP protocol, combined with game theory method (Kumar et al., 2020). One of the methods mentioned above, BAN Logic, has some weaknesses, such as lack of assumptions, message, and differents protocol runs considerations, and subjectivity problem (Agustina et al., 2019; Patel et al., 2010). In this research, we analyze the security criteria of Zhao et al. LVAP with Datta et al. methodology and Scyther tool. We analyze Zhao et al. LVAP with new tool to find protocol vulnerabilities and possible attacks that BAN Logic cannot find. We also propose a modification of Zhao et al. protocol based on security analysis finding from the original protocol and prove that the modified protocol fulfilled security criteria for VANET authentication protocol.

LITERATURE REVIEW

The development of authentication protocol of VANET has been published and offers many different mechanisms to secure VANET communication. In 2017, Liu et al. lightweight V2I authentication protocol using secret sharing method and analyze with BAN Logic (Liu et al., 2017). Liu et al. LVAP achieve message authentication, confidentiality, and practical anonymity. Zhao et al. also propose a lightweight authentication protocol for VANET based on public key This protocol was analyzed with BAN Logic and achieve authentication goal. Zhao et al. also claim that the designed LVAP resist password guessing attack, man-in-the-middle (MITM) attack, and replay attack. Bayat et al. develop NERA protocol that embeds master key in tamper-proof device (TPD) at roadside infrastructure unit (RSU) (Bayat et al., 2020). Formal analysis based on game theory conducted to NERA and prove that NERA achieves message integrity, authentication, and identity privacy. Game theory-based analysis is also used to analyze LPPA protocol (Zhou et al., 2020). LPPA was designed as a lightweight authentication protocol for location-based services in VANET. LPPA claimed achieves vehicle location privacy, interest and interest pattern privacy. Pournaghi et al. also integrate TPD and RSU scheme to design NECPPA protocol (Pournaghi et al., 2018). NECPPA combines Proverif and game theory methods for formal analysis. Proverif proves that NECPPA achieves authentication and observational equivalence, while game theory method proves achievement of message integrity and authentication and identity privacy. Another combination is BAN Logic and AVISPA, which are used to analyze SAPSC protocol (Kanchan et al., 2019). SAPSC protocol implements signcryption mechanism to secure VANET group communication. Formal analysis of SAPSC shows that secrecy and mutual authentication are fulfilled. Kumar et al., in 2020, proposed RSEAP, an authentication protocol based on RFID (Kumar et al., 2020). RSEAP analyzed with game theory and AVISPA and gave the result that RSEAP secure against MITM and replay attack. Scyther tool that we used in this research was also used to analyze RSEAP2, an improvement of RSEAP. Scyther's result shows that RSEAP2 satisfies confidentiality and authentication (Safkhani et al., 2021).

METHOD

The method used in this research is security protocol analysis method consisting of protocol and attacker modeling, specifying security criteria, and checking or proving security criteria (Datta et al., 2010). We use Scyther tool for checking security criteria. Scyther is an automated security protocol verification tool developed based on symbolic model (Cremers, 2014). Scyther takes security protocol model that includes security claims as input and evaluates these. Zhao et al. LVAP consists of a three-way authentication message between vehicle client as vehicle security gateway and cloud server as VANET infrastructure. The protocol step is as follow:

Message 1 :

Message 2 :

Message 3 :

Zhao et al. LVAP steps are modeled with Security Protocol Description Language (SPDL). Table 1 shows protocol model in Scyther.

In this research, the attacker is modeled under the Dolev-Yao model. Dolev-Yao model is integrated with Scyther tools by default. In the Dolev-Yao attacker model, an attacker can intercept all communications on the network, initiate a connection, and send data to other entities on the network. This capability allows attackers to act as man-in-the-middle (MITM) (Do et al., 2019).

After modeling the protocol and attacker, the next step is specifying security criteria. The security criteria of the protocol to be verified include confidentiality and entity authentication. “Secret” claim syntax indicates criteria for the confidentiality of nonce Nc and Ns and the confidentiality of the session key Kcs for each role. Meanwhile, entity authentication criteria are verified based on different authentication levels, such as “Alive” (aliveness), “Weakagree” (weak agreement), “Niagree” (non-injective agreement), and “Nisynch” (non-injective synchronization). Complete explanation of the differences in each authentication level can be seen in (Lauser et al., 2020) and (Cremers & Mauw, 2012).

Table 1

Zhao et al. LVAP Protocol Model

The next stage of security protocol analysis method is checking or proving the security criteria using the Scyther verification tool. Before doing the verification, Scyther first checked the protocol modeling based on the syntax and message order. Scyther then verifies the security criteria based on the claims already included in the modeling. Scyther have command-line tool and graphical user interface (GUI) tool. GUI tool adds usability features and interact with command-line tool automatically as the backend. Figure 1 shows how GUI tool works and interacts with command-line tool. We use GUI tool of Scyther in this research to directly check patterns from each claim if an attack exists. In the background process, Scyther uses semantic analysis to check all possibilities of iterations and find possible attacks on protocol with heuristic method. If one of the claims is met, an "OK" statement will appear in the status column in the same row. If the claim is not fulfilled, a "FAIL" statement will appear, and the option to display an attack graph will be available.

Figure 1.

Fig. 1 Scyther GUI and Command-line Interaction (Alharbi et al., 2015)

RESULT

Security criteria checking was conducted by verifying protocol model on Scyther. The verification results as shown in Figure 2 show several failed or unfulfilled claims from both roles. On the side, one claim failed out of seven claims. While on the side, five claims were failed. For each failed claim, there must be at least one attack.

Figure 2.

Fig. 2 Zhao et al. LVAP Verification Results

Figure 3.

Fig. 3 Attacks on Secret Claim

Figure 4.

Fig. 4 Attacks on Secret Claim

Verification of the confidentiality claim on role ( Secret ) results in one attack, as shown in Figure 3. Nonce value can be directly obtained by the attacker when intercepting Message-3 from because value is not encrypted. Figure 4 shows the attack graph on confidentiality (from Secret claim). The attacker (Eve) can impersonate server . Client assume communicating with legitimate . Then, creates Message-1 by encrypting identity and nonce with the attacker’s public key. The attacker receives and decrypts Message-1 with his private key and obtains the nonce . Figure 5 shows results of the verification of claim Secret . The attacker can impersonate and receive the unencrypted nonce directly. Based on the Dolev-Yao model, the attacker can also immediately find out the contents of the Message-3 sent in plaintext because it can intercept every message from each entity.

Three authentication claims, namely ( Weakagree), ( Niagree), and ( Nisynch), were not fulfilled. The verification results of the three claims also produce the same attack graph, as can be seen in Figure 6. The “Weakagree” claim is not fulfilled because when Scompletes the protocol (on recv_3), it does not communicate with the original in the previous message sequence, specifically when sending Message-1 (send_1) and receives Message-2 (recv_2). The attacker can impersonate to receive Message-1 and send Message-2 to . So does not communicate with the real even though has completed a protocol session. The claims of “Niagree” and “Nisynch” are also not fulfilled because both claims require the same basic conditions as “Weakagree”.

Figure 5.

Fig. 5 Attacks on Secret Claim

Figure 6.

Fig. 6 Attacks on Weakagree Claim

We propose a protocol modification to improve Zhao et al.’s protocol security. Modifications are made by adding a digital signature mechanism in second message and encryption to the last message as key confirmation. The modified protocol step is as follow:

Message 1 :

Message 2 :

Message 3 :

Table 2 shows modified protocol model in Scyther. We also analyze the security of modified protocol using the same method with some changes in protocol model. The attacker model and security criteria to be verified still the same as used in previous original protocol analysis.

Table 2

Modified Zhao et al. LVAP Protocol Model

The results of the verification of the modified VANET Zhao et al. authentication protocol are shown in Figure 7.

Figure 7.

Fig. 7 Modified Zhao et al. LVAP Verification Results

DISCUSSIONS

Based on the results from Scyther, five security criteria are failed to achieve for original Zhao et al. LVAP. Zhao et al. LVAP also vulnerable to MITM attack. This is contradiction with security claimed by Zhao et al. We propose modification of Zhao et al. protocol and analyze with Scyther. Based on the results, all security claims were successfully fulfilled, and no attacks were found from our proposed protocol. Our implementation of signature and key confirmation improve security of Zhao et al. protocol. The attacker is assumed to be unable to compute an entity's private key even though the public key is known in Dolev-Yao model. The attacker cannot impersonate completely because he must also know the private key value of to continue the communication (as a man-in-the-middle). Suppose the attacker is still trying to use a fake private key and create Message-2 with his signature. In that case, will detect message forgery if there is a difference between the digital signature value of the calculated parameter and that received from . The authenticity of sent back by is guaranteed through a digital signature. This condition leads to the following successful security claim.

Table 3

Comparison of Security Claim

Note: (achieved), ×(not achieved)

The attacker cannot obtain by decrypting Message-1 because he unable to impersonate and get involved in the following message. confidentiality is also maintained through the encryption mechanism performed by on Message-3 using the session key. The message can only be opened by the original whose generated the session key previously. Weakagree's claim is fulfilled on 's side because completed a session with , who also previously communicated with the original . Niagree's claim is fulfilled because when completed a session with , who had also previously communicated with the original , the data exchanged, i.e., and , correspond and do not change. Nisynch's claim is fulfilled because when completed a session with , who also previously communicated with the original , then the data exchanged ( and ) matched and did not change, and according to the order of messages that should be. Additionally, Message-3 also serves as a session key confirmation to ensure that and already have the same session key to encrypt the following communication session. Table 3 shows comparison of security claim achieved between original and modified Zhao et al. LVAP. However, our security claims comparison limited to properties defined by Scyther. Scyther can not verify injective agreement and injective synchronization, which leads to security against replay attacks.

CONCLUSION

Based on security analysis with the Datta et al. method and Scyther tool, Zhao et al. LVAP does not meet the confidentiality and authentication criteria. However, our modification with signature and session key confirmation gives improvements to the original protocol security. Furthermore, Scyther results show that our modified Zhao et al. LVAP achieve confidentiality and authentication criteria.

REFERENCES

Abdellah, A. R., Muthanna, A., & Koucheryavy, A. (2019). Robust Estimation of VANET Performance-Based Robust Neural Networks Learning. In O. Galinina, S. Andreev, S. Balandin, & Y.

Koucheryavy (Eds.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems (Vol. 11660, pp. 402–414). Springer International Publishing. https://doi.org/10.1007/978-3-030-30859-9_34

Agustina, E. R., Christine, M., & Fitriani, I. (2019). Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool. Jurnal Teknologi Informasi dan Ilmu Komputer, 6(1), 107. https://doi.org/10.25126/jtiik.2019611303

Alharbi, E., Alsulami, N., & Batarfi, O. (2015). An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack. Journal of Information Security, 06(02), 69–81. https://doi.org/10.4236/jis.2015.62008

Bayat, M., Pournaghi, M., Rahimi, M., & Barmshoory, M. (2020). NERA: A new and efficient RSU based authentication scheme for VANETs. Wireless Networks, 26(5), 3083–3098. https://doi.org/10.1007/s11276-019-02039-xCremers, C. (2014). Scyther User Manual. https://github.com/cascremers/scyther/blob/master/gui/scyther-manual.pdf

Cremers, C., & Mauw, S. (2012). Operational Semantics and Verification of Security Protocols. Springer Berlin Heidelberg. http://link.springer.com/10.1007/978-3-540-78636-8

Datta, A., Jha, S., Li, N., Melski, D., & Reps, T. (2010). Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, 2(1), 1–164. https://doi.org/10.2200/S00260ED1V01Y201003SPT002

Do, Q., Martini, B., & Choo, K.-K. R. (2019). The role of the adversary model in applied security research. Computers & Security, 81, 156–181. https://doi.org/10.1016/j.cose.2018.12.002

Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20. https://doi.org/10.1016/j.vehcom.2017.01.002

Kanchan, S., Singh, G., & Chaudhari, N. S. (2019). SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups. IET Intelligent Transport Systems, 13(9), 1447–1460. https://doi.org/10.1049/iet-its.2018.5474

Kumar, V., Ahmad, M., Mishra, D., Kumari, S., & Khan, M. K. (2020). RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications, 22, 100213. https://doi.org/10.1016/j.vehcom.2019.100213

Lauser, T., Zelle, D., & Krauß, C. (2020). Security Analysis of Automotive Protocols. Computer Science in Cars Symposium, 1–12. https://doi.org/10.1145/3385958.3430482

Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems, 30(16), e3317. https://doi.org/10.1002/dac.3317

Patel, R., Borisaniya, B., Patel, A., Patel, D., Rajarajan, M., & Zisman, A. (2010). Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.

In N. Meghanathan, S. Boumerdassi, N. Chaki, & D. Nagamalai (Eds.), Recent Trends in Network Security and Applications (Vol. 89, pp. 152–163). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_16

Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92. https://doi.org/10.1016/j.comnet.2018.01.015

Rasheed, A., Gillani, S., Ajmal, S., & Qayyum, A. (2017). Vehicular Ad Hoc Network (VANET): A Survey, Challenges, and Applications. In A.

Laouiti, A. Qayyum, & M. N. Mohamad Saad (Eds.), Vehicular Ad-Hoc Networks for Smart Cities (Vol. 548, pp. 39–51). Springer Singapore. https://doi.org/10.1007/978-981-10-3503-6_4

Safkhani, M., Camara, C., Peris-Lopez, P., & Bagheri, N. (2021). RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicular Communications, 28, 100311. https://doi.org/10.1016/j.vehcom.2020.100311

Sheikh, M. S., & Liang, J. (2019). A Comprehensive Survey on VANET Security Services in Traffic Management System. Wireless Communications and Mobile Computing, 2019, 1–23. https://doi.org/10.1155/2019/2423915

Zhao, G., Wang, R., Wang, X., & Zhu, X. (2018). Design and Formal Verification of a VANET Lightweight Authentication Protocol. 2018 IEEE 18th International Conference on Communication Technology (ICCT), 513–517. https://doi.org/10.1109/ICCT.2018.8600064

Zhou, J., Cao, Z., Qin, Z., Dong, X., & Ren, K. (2020). LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Transactions on Information Forensics and Security, 15, 420–434. https://doi.org/10.1109/TIFS.2019.2923156

References

Abdellah, A. R., Muthanna, A., & Koucheryavy, A. (2019). Robust Estimation of VANET Performance-Based Robust Neural Networks Learning. In O. Galinina, S. Andreev, S. Balandin, & Y. Koucheryavy (Eds.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems (Vol. 11660, pp. 402–414). Springer International Publishing. https://doi.org/10.1007/978-3-030-30859-9_34

Agustina, E. R., Christine, M., & Fitriani, I. (2019). Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool. Jurnal Teknologi Informasi dan Ilmu Komputer, 6(1), 107. https://doi.org/10.25126/jtiik.2019611303

Alharbi, E., Alsulami, N., & Batarfi, O. (2015). An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack. Journal of Information Security, 06(02), 69–81. https://doi.org/10.4236/jis.2015.62008

Bayat, M., Pournaghi, M., Rahimi, M., & Barmshoory, M. (2020). NERA: A new and efficient RSU based authentication scheme for VANETs. Wireless Networks, 26(5), 3083–3098. https://doi.org/10.1007/s11276-019-02039-x

Cremers, C. (2014). Scyther User Manual. https://github.com/cascremers/scyther/blob/master/gui/scyther-manual.pdf

Cremers, C., & Mauw, S. (2012). Operational Semantics and Verification of Security Protocols. Springer Berlin Heidelberg. http://link.springer.com/10.1007/978-3-540-78636-8

Datta, A., Jha, S., Li, N., Melski, D., & Reps, T. (2010). Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, 2(1), 1–164. https://doi.org/10.2200/S00260ED1V01Y201003SPT002

Do, Q., Martini, B., & Choo, K.-K. R. (2019). The role of the adversary model in applied security research. Computers & Security, 81, 156–181. https://doi.org/10.1016/j.cose.2018.12.002

Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20. https://doi.org/10.1016/j.vehcom.2017.01.002

Kanchan, S., Singh, G., & Chaudhari, N. S. (2019). SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups. IET Intelligent Transport Systems, 13(9), 1447–1460. https://doi.org/10.1049/iet-its.2018.5474

Kumar, V., Ahmad, M., Mishra, D., Kumari, S., & Khan, M. K. (2020). RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications, 22, 100213. https://doi.org/10.1016/j.vehcom.2019.100213

Lauser, T., Zelle, D., & Krauß, C. (2020). Security Analysis of Automotive Protocols. Computer Science in Cars Symposium, 1–12. https://doi.org/10.1145/3385958.3430482

Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems, 30(16), e3317. https://doi.org/10.1002/dac.3317

Patel, R., Borisaniya, B., Patel, A., Patel, D., Rajarajan, M., & Zisman, A. (2010). Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. In N. Meghanathan, S. Boumerdassi, N. Chaki, & D. Nagamalai (Eds.), Recent Trends in Network Security and Applications (Vol. 89, pp. 152–163). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_16

Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78–92. https://doi.org/10.1016/j.comnet.2018.01.015

Rasheed, A., Gillani, S., Ajmal, S., & Qayyum, A. (2017). Vehicular Ad Hoc Network (VANET): A Survey, Challenges, and Applications. In A. Laouiti, A. Qayyum, & M. N. Mohamad Saad (Eds.), Vehicular Ad-Hoc Networks for Smart Cities (Vol. 548, pp. 39–51). Springer Singapore. https://doi.org/10.1007/978-981-10-3503-6_4

Safkhani, M., Camara, C., Peris-Lopez, P., & Bagheri, N. (2021). RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicular Communications, 28, 100311. https://doi.org/10.1016/j.vehcom.2020.100311

Sheikh, M. S., & Liang, J. (2019). A Comprehensive Survey on VANET Security Services in Traffic Management System. Wireless Communications and Mobile Computing, 2019, 1–23. https://doi.org/10.1155/2019/2423915

Zhao, G., Wang, R., Wang, X., & Zhu, X. (2018). Design and Formal Verification of a VANET Lightweight Authentication Protocol. 2018 IEEE 18th International Conference on Communication Technology (ICCT), 513–517. https://doi.org/10.1109/ICCT.2018.8600064

Zhou, J., Cao, Z., Qin, Z., Dong, X., & Ren, K. (2020). LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Transactions on Information Forensics and Security, 15, 420–434. https://doi.org/10.1109/TIFS.2019.2923156